{"id":33276,"date":"2026-05-22T10:58:58","date_gmt":"2026-05-22T10:58:58","guid":{"rendered":"https:\/\/itbusinesstoday.com\/?p=33276"},"modified":"2026-05-22T10:58:58","modified_gmt":"2026-05-22T10:58:58","slug":"check-point-strengthens-cybersecurity-with-ai-platform","status":"publish","type":"post","link":"https:\/\/itbusinesstoday.com\/ja\/tech\/cybersecurity\/check-point-strengthens-cybersecurity-with-ai-platform\/","title":{"rendered":"\u30c1\u30a7\u30c3\u30af\u30fb\u30dd\u30a4\u30f3\u30c8\u3001AI \u30d7\u30e9\u30c3\u30c8\u30d5\u30a9\u30fc\u30e0\u3067\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u3092\u5f37\u5316"},"content":{"rendered":"<p>\u30c1\u30a7\u30c3\u30af\u30fb\u30dd\u30a4\u30f3\u30c8\u30fb\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u30fb\u30c6\u30af\u30ce\u30ed\u30b8\u30fc\u30ba\u306f\u3001\u81ea\u5f8b\u578b AI \u30a8\u30fc\u30b8\u30a7\u30f3\u30c8\u3092\u5229\u7528\u3057\u3066\u4f01\u696d\u306e\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u30fb\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u7ba1\u7406\u306e\u5927\u90e8\u5206\u3092\u81ea\u52d5\u5316\u3059\u308b\u300cAgentic Network Security Orchestration Platform\u300d\u3092\u767a\u8868\u3057\u307e\u3057\u305f\u3002.<\/p>\n<p>\u4f01\u696d\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u304c\u8907\u96d1\u5316\u3057\u3001\u624b\u4f5c\u696d\u3067\u306e\u904b\u7528\u304c\u56f0\u96e3\u306b\u306a\u3063\u3066\u3044\u308b\u3053\u3068\u3092\u53d7\u3051\u3066\u306e\u767a\u8868\u3067\u3059\u3002\u30cf\u30a4\u30d6\u30ea\u30c3\u30c9\u30fb\u30af\u30e9\u30a6\u30c9\u74b0\u5883\u3001\u30b3\u30cd\u30af\u30c6\u30c3\u30c9\u30fb\u30c7\u30d0\u30a4\u30b9\u3001\u5408\u4f75\u3001AI\u30a4\u30f3\u30d5\u30e9\u30b9\u30c8\u30e9\u30af\u30c1\u30e3\u306b\u3088\u308a\u3001\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30fb\u30c1\u30fc\u30e0\u3078\u306e\u30d7\u30ec\u30c3\u30b7\u30e3\u30fc\u306f\u5897\u5927\u3057\u3066\u3044\u307e\u3059\u3002.<\/p>\n<p>\u30c1\u30a7\u30c3\u30af\u30fb\u30dd\u30a4\u30f3\u30c8\u306e\u30d7\u30e9\u30c3\u30c8\u30d5\u30a9\u30fc\u30e0\u306f\u3001\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u30fb\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u3092\u5f93\u6765\u306e\u30eb\u30fc\u30eb\u30fb\u30d9\u30fc\u30b9\u306e\u7ba1\u7406\u304b\u3089\u30a4\u30f3\u30c6\u30f3\u30c8\u30fb\u30d9\u30fc\u30b9\u306e\u30a2\u30d7\u30ed\u30fc\u30c1\u3078\u3068\u79fb\u884c\u3057\u307e\u3059\u3002\u4f55\u5343\u3082\u306e\u30d5\u30a1\u30a4\u30a2\u30a6\u30a9\u30fc\u30eb\u30fb\u30eb\u30fc\u30eb\u3092\u624b\u4f5c\u696d\u3067\u51e6\u7406\u3059\u308b\u4ee3\u308f\u308a\u306b\u3001\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30fb\u30c1\u30fc\u30e0\u304c\u30d3\u30b8\u30cd\u30b9\u30fb\u30a4\u30f3\u30c6\u30f3\u30c8\u3092\u5b9a\u7fa9\u3057\u3001AI \u30a8\u30fc\u30b8\u30a7\u30f3\u30c8\u304c\u305d\u306e\u5b9f\u884c\u3001\u30c8\u30e9\u30d6\u30eb\u30b7\u30e5\u30fc\u30c6\u30a3\u30f3\u30b0\u3001\u30dd\u30ea\u30b7\u30fc\u5f37\u5316\u3001\u30b3\u30f3\u30d7\u30e9\u30a4\u30a2\u30f3\u30b9\u904b\u7528\u3092\u7ba1\u7406\u3057\u307e\u3059\u3002.<\/p>\n<h4>\u3053\u3061\u3089\u3082\u304a\u8aad\u307f\u304f\u3060\u3055\u3044\uff1a <a class=\"p-url\" href=\"https:\/\/itbusinesstoday.com\/ja\/tech\/cybersecurity\/needswell-enhances-security-services-with-canon-it\/\" rel=\"bookmark\">\u30cb\u30fc\u30c9\u30b9\u30a6\u30a7\u30eb\u3001\u30ad\u30e4\u30ce\u30f3IT\u3068\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30b5\u30fc\u30d3\u30b9\u3092\u5f37\u5316<\/a><\/h4>\n<p>\u30c1\u30a7\u30c3\u30af\u30fb\u30dd\u30a4\u30f3\u30c8\u306e\u30ea\u30a2\u30eb\u30bf\u30a4\u30e0\u30fb\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u30fb\u30ca\u30ec\u30c3\u30b8\u30fb\u30b0\u30e9\u30d5\u306f\u3001\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u306e\u30c8\u30dd\u30ed\u30b8\u3001\u30c8\u30e9\u30d5\u30a3\u30c3\u30af\u30fb\u30d5\u30ed\u30fc\u3001\u69cb\u6210\u3001\u304a\u3088\u3073\u8cc7\u7523\u306e\u95a2\u4fc2\u3092\u5e38\u306b\u30de\u30c3\u30d4\u30f3\u30b0\u3057\u307e\u3059\u3002\u307e\u305f\u3001\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u4e0a\u306e\u610f\u601d\u6c7a\u5b9a\u3092\u884c\u3046\u524d\u306b\u3001\u65e7\u6765\u306e\u30d5\u30a1\u30a4\u30a2\u30a6\u30a9\u30fc\u30eb\u30fb\u30dd\u30ea\u30b7\u30fc\u306e\u80cc\u5f8c\u306b\u3042\u308b\u30d3\u30b8\u30cd\u30b9\u4e0a\u306e\u76ee\u7684\u3082\u89e3\u91c8\u3057\u307e\u3059\u3002.<\/p>\n<p>\u30b3\u30a2\u6a5f\u80fd\u306b\u306f\u3001\u81ea\u7136\u8a00\u8a9e\u30ea\u30af\u30a8\u30b9\u30c8\u306e\u30d5\u30a1\u30a4\u30a2\u30a6\u30a9\u30fc\u30eb\u30fb\u30dd\u30ea\u30b7\u30fc\u3078\u306e\u5909\u63db\u3001\u81ea\u5f8b\u7684\u306a\u554f\u984c\u8a3a\u65ad\u3001PCI-DSS\u3084NIST\u306a\u3069\u306e\u6a19\u6e96\u306b\u5bfe\u3059\u308b\u7d99\u7d9a\u7684\u306a\u30b3\u30f3\u30d7\u30e9\u30a4\u30a2\u30f3\u30b9\u30fb\u30de\u30c3\u30d4\u30f3\u30b0\u3001\u30bc\u30ed\u30c8\u30e9\u30b9\u30c8\u30fb\u30dd\u30ea\u30b7\u30fc\u306e\u81ea\u52d5\u5f37\u5316\u306a\u3069\u304c\u3042\u308a\u307e\u3059\u3002.<\/p>\n<p><a href=\"https:\/\/www.checkpoint.com\/\">\u30c1\u30a7\u30c3\u30af\u30dd\u30a4\u30f3\u30c8<\/a> \u307e\u305f\u3001\u30d7\u30e9\u30c3\u30c8\u30d5\u30a9\u30fc\u30e0\u306e\u958b\u767a\u3092\u52a0\u901f\u3055\u305b\u308b\u305f\u3081\u3001Deepchecks\u793e\u306e\u30c1\u30fc\u30e0\u3068\u77e5\u7684\u8ca1\u7523\u3092\u8cb7\u53ce\u3059\u308b\u3053\u3068\u3082\u78ba\u8a8d\u3057\u307e\u3057\u305f\u3002.<\/p>","protected":false},"excerpt":{"rendered":"<p>Check Point Software Technologies has announced its new \u2018Agentic Network Security Orchestration Platform,\u2019 built to automate large parts of enterprise network security management using autonomous AI agents. The launch comes as enterprise networks become too complex for manual operations. Hybrid cloud environments, connected devices, mergers, and AI infrastructure are increasing the pressure on security teams, while routine policy changes can still take weeks to review and implement. Check Point\u2019s platform shifts network security from traditional rule-based management to an intent-based approach. Instead of manually handling thousands of firewall rules, security teams define business intent while AI agents manage execution, troubleshooting, policy tightening, and compliance operations. Also Read: Needswell Enhances Security [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":33323,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_bbp_topic_count":0,"_bbp_reply_count":0,"_bbp_total_topic_count":0,"_bbp_total_reply_count":0,"_bbp_voice_count":0,"_bbp_anonymous_reply_count":0,"_bbp_topic_count_hidden":0,"_bbp_reply_count_hidden":0,"_bbp_forum_subforum_count":0,"wprm-recipe-roundup-name":"","wprm-recipe-roundup-description":"","postBodyCss":"","postBodyMargin":[],"postBodyPadding":[],"postBodyBackground":{"backgroundType":"classic","gradient":""},"footnotes":""},"categories":[184,207,237,1838,85],"tags":[533,7949,110,13083,2476],"ppma_author":[572],"class_list":["post-33276","post","type-post","status-publish","format-standard","has-post-thumbnail","category-cybersecurity","category-international","category-news","category-quick-reads","category-tech","tag-ai-agent","tag-check-point","tag-cybersecurity","tag-network-security-management","tag-zero-trust"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Check Point Enhances Network Security Automation<\/title>\n<meta name=\"description\" content=\"Check Point launches an AI-driven platform for network security operations with unified orchestration and dynamic threat prevention.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/itbusinesstoday.com\/ja\/tech\/cybersecurity\/check-point-strengthens-cybersecurity-with-ai-platform\/\" \/>\n<meta property=\"og:locale\" content=\"ja_JP\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Check Point Enhances Network Security Automation\" \/>\n<meta property=\"og:description\" content=\"Check Point launches an AI-driven platform for network security operations with unified orchestration and dynamic threat prevention.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/itbusinesstoday.com\/ja\/tech\/cybersecurity\/check-point-strengthens-cybersecurity-with-ai-platform\/\" \/>\n<meta property=\"og:site_name\" content=\"itbusinesstoday\" \/>\n<meta property=\"article:published_time\" content=\"2026-05-22T10:58:58+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2026\/05\/Check-Point-Strengthens-Cybersecurity-With-AI-Platform.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"1201\" \/>\n\t<meta property=\"og:image:height\" content=\"800\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"ITBT StaffWriter\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u57f7\u7b46\u8005\" \/>\n\t<meta name=\"twitter:data1\" content=\"ITBT StaffWriter\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u63a8\u5b9a\u8aad\u307f\u53d6\u308a\u6642\u9593\" \/>\n\t<meta name=\"twitter:data2\" content=\"1\u5206\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Check Point Enhances Network Security Automation","description":"Check Point launches an AI-driven platform for network security operations with unified orchestration and dynamic threat prevention.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/itbusinesstoday.com\/ja\/tech\/cybersecurity\/check-point-strengthens-cybersecurity-with-ai-platform\/","og_locale":"ja_JP","og_type":"article","og_title":"Check Point Enhances Network Security Automation","og_description":"Check Point launches an AI-driven platform for network security operations with unified orchestration and dynamic threat prevention.","og_url":"https:\/\/itbusinesstoday.com\/ja\/tech\/cybersecurity\/check-point-strengthens-cybersecurity-with-ai-platform\/","og_site_name":"itbusinesstoday","article_published_time":"2026-05-22T10:58:58+00:00","og_image":[{"width":1201,"height":800,"url":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2026\/05\/Check-Point-Strengthens-Cybersecurity-With-AI-Platform.webp","type":"image\/webp"}],"author":"ITBT StaffWriter","twitter_card":"summary_large_image","twitter_misc":{"\u57f7\u7b46\u8005":"ITBT StaffWriter","\u63a8\u5b9a\u8aad\u307f\u53d6\u308a\u6642\u9593":"1\u5206"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/check-point-strengthens-cybersecurity-with-ai-platform\/#article","isPartOf":{"@id":"https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/check-point-strengthens-cybersecurity-with-ai-platform\/"},"author":{"name":"ITBT StaffWriter","@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#\/schema\/person\/94fb575e469aff25a4b938814d050f15"},"headline":"Check Point Strengthens Cybersecurity With AI Platform","datePublished":"2026-05-22T10:58:58+00:00","mainEntityOfPage":{"@id":"https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/check-point-strengthens-cybersecurity-with-ai-platform\/"},"wordCount":209,"publisher":{"@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#organization"},"image":{"@id":"https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/check-point-strengthens-cybersecurity-with-ai-platform\/#primaryimage"},"thumbnailUrl":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2026\/05\/Check-Point-Strengthens-Cybersecurity-With-AI-Platform.webp","keywords":["AI Agent","Check Point","cybersecurity","network security management","Zero Trust"],"articleSection":["Cybersecurity","International","News","Quick Reads","Tech"],"inLanguage":"ja"},{"@type":"WebPage","@id":"https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/check-point-strengthens-cybersecurity-with-ai-platform\/","url":"https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/check-point-strengthens-cybersecurity-with-ai-platform\/","name":"Check Point Enhances Network Security Automation","isPartOf":{"@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#website"},"primaryImageOfPage":{"@id":"https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/check-point-strengthens-cybersecurity-with-ai-platform\/#primaryimage"},"image":{"@id":"https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/check-point-strengthens-cybersecurity-with-ai-platform\/#primaryimage"},"thumbnailUrl":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2026\/05\/Check-Point-Strengthens-Cybersecurity-With-AI-Platform.webp","datePublished":"2026-05-22T10:58:58+00:00","description":"Check Point launches an AI-driven platform for network security operations with unified orchestration and dynamic threat prevention.","breadcrumb":{"@id":"https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/check-point-strengthens-cybersecurity-with-ai-platform\/#breadcrumb"},"inLanguage":"ja","potentialAction":[{"@type":"ReadAction","target":["https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/check-point-strengthens-cybersecurity-with-ai-platform\/"]}]},{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/check-point-strengthens-cybersecurity-with-ai-platform\/#primaryimage","url":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2026\/05\/Check-Point-Strengthens-Cybersecurity-With-AI-Platform.webp","contentUrl":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2026\/05\/Check-Point-Strengthens-Cybersecurity-With-AI-Platform.webp","width":1201,"height":800,"caption":"Check Point"},{"@type":"BreadcrumbList","@id":"https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/check-point-strengthens-cybersecurity-with-ai-platform\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/itbusinesstoday.com\/"},{"@type":"ListItem","position":2,"name":"Check Point Strengthens Cybersecurity With AI Platform"}]},{"@type":"WebSite","@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#website","url":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/","name":"\u30a4\u30c3\u30c8\u30d3\u30b8\u30cd\u30b9\u30c8\u30a5\u30c7\u30a4","description":"","publisher":{"@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ja"},{"@type":"Organization","@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#organization","name":"\u30a4\u30c3\u30c8\u30d3\u30b8\u30cd\u30b9\u30c8\u30a5\u30c7\u30a4","url":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/","logo":{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#\/schema\/logo\/image\/","url":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2025\/01\/Asset-1.png","contentUrl":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2025\/01\/Asset-1.png","width":663,"height":275,"caption":"itbusinesstoday"},"image":{"@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#\/schema\/person\/94fb575e469aff25a4b938814d050f15","name":"ITBT\u30b9\u30bf\u30c3\u30d5\u30e9\u30a4\u30bf\u30fc","image":{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2025\/01\/Favicon-1.png90b3cb23d1d9c08733d969d29ea2d30d","url":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2025\/01\/Favicon-1.png","contentUrl":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2025\/01\/Favicon-1.png","caption":"ITBT StaffWriter"},"description":"ITBT\u30b9\u30bf\u30c3\u30d5\u30e9\u30a4\u30bf\u30fc\u306f\u3001IT Business Today\u306e\u793e\u5185\u5bc4\u7a3f\u8005\u3067\u3001\u30bf\u30a4\u30e0\u30ea\u30fc\u306a\u30cb\u30e5\u30fc\u30b9\u3068QuickBytes\u306e\u914d\u4fe1\u3092\u62c5\u5f53\u3057\u3066\u3044\u307e\u3059\u3002IT\u3001\u30cf\u30a4\u30c6\u30af\u3001\u4f01\u696d\u30bd\u30ea\u30e5\u30fc\u30b7\u30e7\u30f3\u306e\u6700\u65b0\u52d5\u5411\u3092\u30ab\u30d0\u30fc\u3057\u3001\u7c21\u6f54\u3067\u30a4\u30f3\u30d1\u30af\u30c8\u306e\u3042\u308b\u6700\u65b0\u60c5\u5831\u3092\u8aad\u8005\u306b\u63d0\u4f9b\u3057\u3066\u3044\u307e\u3059\u3002","sameAs":["https:\/\/itbusinesstoday.com\/"],"url":"https:\/\/itbusinesstoday.com\/ja\/author\/itbt-staffwriter\/"}]}},"authors":[{"term_id":572,"user_id":7,"is_guest":0,"slug":"itbt-staffwriter","display_name":"ITBT StaffWriter","avatar_url":{"url":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2025\/01\/Favicon-1.png","url2x":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2025\/01\/Favicon-1.png"},"0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/posts\/33276","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/comments?post=33276"}],"version-history":[{"count":1,"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/posts\/33276\/revisions"}],"predecessor-version":[{"id":33277,"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/posts\/33276\/revisions\/33277"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/media\/33323"}],"wp:attachment":[{"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/media?parent=33276"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/categories?post=33276"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/tags?post=33276"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/ppma_author?post=33276"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}